Image Processing for Detecting Botnet Attacks: A Novel Approach for Flexibility and Scalability

Aurelien Agniel, David Arnold, J. Saniie
{"title":"Image Processing for Detecting Botnet Attacks: A Novel Approach for Flexibility and Scalability","authors":"Aurelien Agniel, David Arnold, J. Saniie","doi":"10.1109/RTC56148.2022.9945055","DOIUrl":null,"url":null,"abstract":"Continued adoption of the Internet of Things (IoT) redefines the paradigm of network architectures. Historically, network architectures relied on centralized resources and data centers. The introduction of the IoT challenges this notion by placing computing resources and observation at the edge of the network. As a result, decentralized approaches for information processing and gathering can be adopted and explored. However, this shift greatly expands the network footprint and shifts traffic away from the center of the network, where observation and cybersecurity monitoring tools are frequently located. Further, IoT devices are often computationally constrained, limiting their readiness to deal with cyber-threats. These security vulnerabilities make the IoT an easy target for hacking groups and lead to the proliferation of zombie networks of compromised devices. Frequently, zombie networks, otherwise known as botnets, are coordinated to attack targets and overload network resources through a Distributed Denial of Service (DDoS) attack. In order to crack down on these botnets, it is essential to develop new methods for quickly and efficiently detecting botnet activity. This study proposes a novel botnet detection technique that first pre-processes network data through computer vision and image processing. The processed dataset is then sent to a neural network for final classification. Two neural networks will be explored, a sequential model and an auto-encoder model. The application of image processing has two advantages over current methods. First, the image processing is simple enough to be completed at the edge of the network by the IoT devices. Second, preprocessing the data allows us to use a shallower network, decreasing detection time further. We will utilize the N-BaIoT dataset and compare our findings to their results.","PeriodicalId":437897,"journal":{"name":"2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference and Expo on Real Time Communications at IIT (RTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTC56148.2022.9945055","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Continued adoption of the Internet of Things (IoT) redefines the paradigm of network architectures. Historically, network architectures relied on centralized resources and data centers. The introduction of the IoT challenges this notion by placing computing resources and observation at the edge of the network. As a result, decentralized approaches for information processing and gathering can be adopted and explored. However, this shift greatly expands the network footprint and shifts traffic away from the center of the network, where observation and cybersecurity monitoring tools are frequently located. Further, IoT devices are often computationally constrained, limiting their readiness to deal with cyber-threats. These security vulnerabilities make the IoT an easy target for hacking groups and lead to the proliferation of zombie networks of compromised devices. Frequently, zombie networks, otherwise known as botnets, are coordinated to attack targets and overload network resources through a Distributed Denial of Service (DDoS) attack. In order to crack down on these botnets, it is essential to develop new methods for quickly and efficiently detecting botnet activity. This study proposes a novel botnet detection technique that first pre-processes network data through computer vision and image processing. The processed dataset is then sent to a neural network for final classification. Two neural networks will be explored, a sequential model and an auto-encoder model. The application of image processing has two advantages over current methods. First, the image processing is simple enough to be completed at the edge of the network by the IoT devices. Second, preprocessing the data allows us to use a shallower network, decreasing detection time further. We will utilize the N-BaIoT dataset and compare our findings to their results.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于检测僵尸网络攻击的图像处理:一种灵活性和可扩展性的新方法
物联网(IoT)的持续采用重新定义了网络架构的范式。从历史上看,网络架构依赖于集中的资源和数据中心。物联网的引入通过将计算资源和观察放置在网络边缘来挑战这一概念。因此,可以采用和探索分散处理和收集信息的方法。然而,这种转变极大地扩大了网络的占地面积,并将流量从网络中心转移出去,而网络中心通常是观察和网络安全监控工具的所在地。此外,物联网设备通常受到计算限制,限制了它们应对网络威胁的准备。这些安全漏洞使物联网很容易成为黑客组织的目标,并导致受感染设备的僵尸网络的扩散。僵尸网络(zombie network, botnet)通常通过协同攻击目标,使网络资源过载。为了打击这些僵尸网络,必须开发快速有效地检测僵尸网络活动的新方法。本研究提出一种新的僵尸网络检测技术,该技术首先通过计算机视觉和图像处理对网络数据进行预处理。然后将处理后的数据集发送到神经网络进行最终分类。我们将探讨两个神经网络,一个顺序模型和一个自编码器模型。与现有的方法相比,图像处理的应用有两个优点。首先,图像处理非常简单,可以由物联网设备在网络边缘完成。其次,预处理数据允许我们使用较浅的网络,进一步减少检测时间。我们将利用N-BaIoT数据集,并将我们的发现与他们的结果进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Image Processing for Detecting Botnet Attacks: A Novel Approach for Flexibility and Scalability Edge Computing for Real Time Botnet Propagation Detection Maximizing Stable Throughput in Age of Information-Based Cognitive Radio
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1